threatintel
actor tracker
All actors

Sandworm

sandworm · primary source: MITRE · first observed 2008
RU · RussiaState-sponsoredHigh confidencelast cited Feb 11, 2025 · 1.3y ago

Russian military-intelligence (GRU Unit 74455) intrusion set responsible for some of the most destructive cyberattacks publicly attributed to a nation-state: the 2015 and 2016 Ukrainian power-grid outages, the 2017 NotPetya wiper outbreak (the costliest cyberattack in history), and the 2018 Olympic Destroyer attack against the Winter Olympics. Operations continue against Ukrainian critical infrastructure, including the 2022 Industroyer2 attempt.

Aliases

Voodoo BearCrowdStrikeSeashell BlizzardMicrosoftIRIDIUMMicrosoftTeleBotsOtherBlackEnergy GroupOther

Motivations

destructiondisruptionespionage

Target sectors

energygovernmenttransportationmediaics

Target countries

UAGEUSFRKRPL

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Sandworm
  • Russia
  • destruction
  • disruption
  • espionage
Infrastructure
Victim
  • energy
  • government
  • transportation
  • UA
  • GE
  • +1 more

MITRE ATT&CK techniques

Tools & malware

4 entries

Timeline

4 events
  1. ReportHigh2025-02-12·Microsoft Threat Intelligence

    Microsoft details Seashell Blizzard 'BadPilot' subgroup multi-year access ops

    Microsoft Threat Intelligence published research on a Sandworm (Seashell Blizzard) subgroup it tracks as BadPilot, active since at least 2021, that opportunistically exploits internet-facing appliances (notably ConnectWise ScreenConnect and Fortinet FortiClient EMS since early 2024) to establish persistent access for follow-on Sandworm operations. Targets since 2024 expanded to U.S. and U.K. organizations across energy, oil and gas, telecommunications, shipping, arms manufacturing, and government.

    initial-accessedge-devicesgruusuk
  2. IndictmentHigh2020-10-19·U.S. Department of Justice

    DOJ indicts six GRU Unit 74455 officers

    The U.S. Department of Justice unsealed an indictment charging six officers of the Russian GRU's Unit 74455 (Sandworm) in connection with a years-long campaign that included the 2015 and 2016 Ukraine power-grid attacks, the 2017 NotPetya outbreak, the 2018 Olympic Destroyer attack against the PyeongChang Winter Olympics, and operations against the 2017 French elections.

    dojindictmentgru
  3. CompromiseCritical2017-06-27·UK National Cyber Security Centre

    NotPetya wiper outbreak via M.E.Doc supply chain

    A destructive wiper masquerading as ransomware spread globally via a trojanized update to M.E.Doc, a Ukrainian accounting software package. Damages were later estimated at over USD 10 billion, making NotPetya the costliest cyberattack on record. The U.S., U.K., and other governments publicly attributed the operation to the Russian GRU.

    wipersupply-chainukrainedestruction
  4. CompromiseCritical2015-12-23·CISA (ICS-CERT)

    Coordinated attack on Ukrainian electricity distribution

    Three Ukrainian regional electricity distribution companies (oblenergos) were simultaneously attacked, cutting power to approximately 225,000 customers for several hours. ICS-CERT and later attribution work tied the operation to Sandworm; this is widely regarded as the first publicly confirmed cyberattack to cause a power outage.

    icsukrainedestructionenergy

Indicators of compromise

3 indicators
csv
TypeValueFirst seenSource
SHA-1
fd9c17c35a68fc505235e20c6e50c622aed8dea0
family · Industroyer2
Industroyer2 sample (108_100.exe), an IEC-104 ICS-disruption tool that Sandworm deployed against a Ukrainian energy provider on 8 April 2022. Discovery and IOC publication by ESET working with CERT-UA; ESET assesses Sandworm responsibility with high confidence.
Apr 7, 2022ESET
SHA-256
9b4dfaca873961174ba935fddaf696145afe7bbf5734509f95feb54f3584fd9a
family · AcidRain
AcidRain - MIPS ELF wiper (filename 'ukrop') that bricked modems on Viasat's KA-SAT network on 24 February 2022, disrupting service across Ukraine and downstream wind-turbine telemetry in Germany. SentinelLabs published the hash and noted code overlap with VPNFilter (attributed to Sandworm).
Feb 23, 2022SentinelLabs
SHA-256
1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
family · HermeticWiper
HermeticWiper / Trojan.Killdisk sample (Symantec Threat Hunter Team), deployed against Ukrainian organisations from 23 February 2022. Listed in CISA / FBI joint advisory AA22-057A appendix Table 2. The campaign is widely attributed to GRU Unit 74455 (Sandworm).
Feb 22, 2022CISA

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Sandworm — actor profile. Retrieved from https://threatintel.local/actors/sandworm

latest cited activity · 2025-02-12 · 3 cataloged indicators